Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Is there any course for Hacking? How the people in become
hackers?

Answer Posted / suba mca

it means the hacker is stoleing the securty informations.
ie. username and password.

Is This Answer Correct ?    4 Yes 1 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

How does network security work?

962


Explain what are digital signatures and smart cards?

1157


How does traceroute work? Now how does traceroute make sure that the packet follows the same path that a previous (with ttl - 1) probe packet went in?

936


Explain what does cia stand for in security management?

951


How does ransomware work?

1031


What is an arp?

1123


What is http flood?

988


If you need to encrypt and compress data for transmission, how would you achieve it?

1095


Why should you care about the OSI Reference Model

1010


What is intrusion prevention systems (ips)?

981


What is RIS?

1013


In context of public key encryption, if you are using both signature and encryption features, what key will you use for encryption and which one will you use for signing?

959


What is Imaging/ghosting?

1051


Define the meaning of an Authentication.

1032


What is difference between baseband and broadband transmission

1117